# 当服务器向外访问时使用的ip # # (default: not specified) #out_addr = 0.0.0.0
# 连入过机器的虚拟IP # 这不影响log,只影响w、last等命令 # # If not specified, the actual IP address is displayed instead (default # behaviour). # # (default: not specified) #fake_addr = 192.168.66.254
# To record SMTP traffic, install an SMTP honeypoint. # (e.g https://github.com/awhitehatter/mailoney), run # python mailoney.py -s yahoo.com -t schizo_open_relay -p 12525 # forward_redirect_25 = 127.0.0.1:12525 # forward_redirect_587 = 127.0.0.1:12525
# This enables tunneling forwarding requests to another address # Useful for forwarding protocols to a proxy like Squid # (default: false) forward_tunnel = false
# Configure where to tunnel the data to. # forward_tunnel_ = :
# 指定可连入IP # # (default: 0.0.0.0) = any IPv4 address #listen_addr = 0.0.0.0 # (use :: for listen to all IPv6 and IPv4 addresses) #listen_addr = ::
# 指定监听端口 # # (default: 2223) #listen_port = 2223
# Endpoint to listen on for incoming Telnet connections. # See https://twistedmatrix.com/documents/current/core/howto/endpoints.html#servers # (default: listen_endpoints = tcp:2223:interface=0.0.0.0) # (use systemd: endpoint for systemd activation) # listen_endpoints = systemd:domain=INET:index=0 # For IPv4 and IPv6: listen_endpoints = tcp6:2223:interface=\:\: tcp:2223:interface=0.0.0.0 # Listening on multiple endpoints is supported with a single space seperator # e.g “listen_endpoints = tcp:2223:interface=0.0.0.0 tcp:2323:interface=0.0.0.0” will result listening both on ports 2223 and 2323 # use authbind for port numbers under 1024
listen_endpoints = tcp:2223:interface=0.0.0.0
# Source Port to report in logs (useful if you use iptables to forward ports to Cowrie) #reported_port = 23
# ============================================================================ # Database logging Specific Options # ============================================================================
# ============================================================================ # Output Plugins # These provide an extensible mechanism to send audit log entries to third # parties. The audit entries contain information on clients connecting to # the honeypot. # # Output entries need to start with ‘output_’ and have the ‘enabled’ entry. # ============================================================================
# Supports logging to Elasticsearch # This is a simple early release # #[output_elasticsearch] #enabled = false #host = localhost #port = 9200 #index = cowrie #type = cowrie #pipeline = geoip
# Send login attemp information to SANS DShield # See https://isc.sans.edu/ssh.html # You must signup for an api key. # Once registered, find your details at: https://isc.sans.edu/myaccount.html # #[output_dshield] #userid = userid_here #auth_key = auth_key_here #batch_size = 100 #enabled = false
# Local Syslog output module # # This sends log messages to the local syslog daemon. # Facility can be: # KERN, USER, MAIL, DAEMON, AUTH, LPR, NEWS, UUCP, CRON, SYSLOG and LOCAL0 to LOCAL7. # # Format can be: # text, cef # #[output_localsyslog] #enabled = false #facility = USER #format = text
# Text output # This writes audit log entries to a text file # # Format can be: # text, cef # #[output_textlog] #enabled = false #logfile = ${honeypot:log_path}/audit.log #format = text
# MySQL logging module # Database structure for this module is supplied in docs/sql/mysql.sql # # MySQL logging requires extra software: sudo apt-get install libmysqlclient-dev # MySQL logging requires an extra Python module: pip install mysql-python # #[output_mysql] #enabled = false #host = localhost #database = cowrie #username = cowrie #password = secret #port = 3306 #debug = false
# VirusTotal output module # You must signup for an api key. # #[output_virustotal] #enabled = false #api_key = 0123456789abcdef0123456789abcdef0123456789abcdef0123456789abcdef #upload = True #debug = False #scan_file = True #scan_url = False
# Cuckoo output module #[output_cuckoo] #enabled = false # no slash at the end #url_base = http://127.0.0.1:8090 #user = user #passwd = passwd # force will upload duplicated files to cuckoo #force = 0
# upload to MalShare #[output_malshare] #enabled = false
# This will produce a lot of messages - you have been warned…. #[output_slack] #enabled = false #channel = channel_that_events_should_be_posted_in #token = slack_token_for_your_bot #debug = false
# https://csirtg.io # You must signup for an api key. # #[output_csirtg] #enabled = false #username = wes #feed = scanners #description = random scanning activity #token = 0123456789abcdef0123456789abcdef0123456789abcdef0123456789abcdef
# Upload files that cowrie has captured to an S3 (or compatible bucket) # Files are stored with a name that is the SHA of their contents # #[output_s3] # # The AWS credentials to use. # Leave these blank to use botocore’s credential discovery e.g .aws/config or ENV variables. # As per https://github.com/boto/botocore/blob/develop/botocore/credentials.py#L50-L65 #access_key_id = AKIDEXAMPLE #secret_access_key = wJalrXUtnFEMI/K7MDENG+bPxRfiCYEXAMPLEKEY # # The bucket to store the files in. The bucket must already exist. #bucket = my-cowrie-bucket # # The region the bucket is in #region = eu-west-1 # # An alternate endpoint URL. If you self host a pithos instance you can set # this to its URL (e.g. https://s3.mydomain.com) - can otherwise be blank #endpoint = # # Whether or not to validate the S3 certificate. Set this to ‘no’ to turn this # off. Do not do this for real AWS. It’s only needed for self-hosted S3 clone # where you don’t yet have real certificates. #verify = no
#[output_redis] #enabled = false #host = 127.0.0.1 #port = 6379 # DB of the redis server. Defaults to 0 #db = 0 # Password of the redis server. Defaults to None #password = secret # Name of the list to push to or the channel to publish to. Required #keyname = cowrie # Method to use when sending data to redis. # Can be one of [lpush, rpush, publish]. Defaults to lpush #send_method = lpush
# Perform Reverse DNS lookup #[output_reversedns] #enabled = true # Timeout in seconds #timeout = 3
#[output_greynoise] #enabled = true #debug=False # Name of the tags separated by comma, for which the IP has to be scanned for. # Example “SHODAN,JBOSS_WORM,CPANEL_SCANNER_LOW” # If there isn’t any specific tag then just leave it “all” #tags = all # It’s optional to have API key, so if you don’t want to but # API key then leave this option commented #api_key = 1234567890
0:009> g (bfc.c78): Access violation - code c0000005 (first chance) First chance exceptions are reported before any exception handling. This exception may be expected and handled. eax=001d5a2c ebx=00000000 ecx=0c0c0c0c edx=0000003d esi=001be3f8 edi=01776230 eip=7e38dfe8 esp=0012e198 ebp=0012e1a8 iopl=0 nv up ei pl nz na po nc cs=001b ss=0023 ds=0023 es=0023 fs=003b gs=0000 efl=00010202 *** ERROR: Symbol file could not be found. Defaulted to export symbols for C:\WINDOWS\system32\mshtml.dll - mshtml!CreateHTMLPropertyPage+0x38108: 7e38dfe8 ff5104 call dword ptr [ecx+4] ds:0023:0c0c0c10=????????